Recent Blog Posts

Ransomware is Only Getting Worse in 2022? So What Can You Do?

Let?s go through a quick review of what ransomware is, and then what needs to be done to resist it successfully. What is Ransomware: A Review Ransomware?the malware that locks down a system until a monetary sum is paid?has been around for a few years, and during that time has expanded and grown in its capabilities. It?s also remained a popular form of cyberattack, with Trend Micro reporting that 84 (that?s 8-4) percent of organizations experienced either phishing or ransomware in the past year? and if we?re being honest, the two often go hand in hand. There are also dozens of new innovations present in modern ransomware strains, with more and more tricky ways to get past a company?s defenses. Now, instead of just phishing their victims into installing their malicious payload, hackers who use ransomware now twist the knife a little (or a lot) more by threatening to leak data if a ransom isn?t paid. Some enterprising cybercriminals offer RaaS?Ransomware-as-a-Service?to those who want someone to hurt, and are willing to pay to make it happen. Ransomware has become so notorious and even normalized that some attackers have found success by simply claiming to have infected a victim?s PC, bluffing their way to a hefty ransom payment. Clearly, ransomware is an issue that is not going away anytime soon, which means that businesses need to be prepared to deal with it effectively. What to Do to Face Down Ransomware This is one topic that has gotten far more complicated as time has passed, simply because of the innovations we described above. Not all that long ago, our best advice (should one find themselves infected) was to make sure they always kept a backup so they could refuse to pay the ransom and simply restore their data infrastructure after the fact. Now, the double extortion method (exfiltrating data, and then threatening to leak it unless the affiliated company pays a second ransom after they?ve unlocked their systems) makes it dangerous to even do that. While we will always recommend that a business keep a comprehensive and redundant data backup for the sake of data continuity in general, a backup can no longer be seen as the de facto insurance against ransomware. This makes it even more important that a business do everything possible to keep ransomware out in the first place. Let?s go over what this will take: Keeping Defenses Up-to-Date Even basic firewalls and antivirus programs do a pretty darn good job of filtering out ransomware attempts, so it is important that you put in the effort to keep these protections?as well as all of your systems?as up-to-date as possible. This includes keeping track of any patches that are released for your chosen solutions and promptly applying them. More advanced protections are also advisable, such as those that monitor your systems and the programs installed on them for suspicious activity. This is particularly advisable where your email comes into play. If possible, have your IT resource configure your email gateway to scan ZIP attachments and block executable files. In short, the fewer ransomware attempts your team needs to deal with personally, the less likely it is that they?ll slip up. Educating and Evaluating Users While we?re on the topic, however, it is important that your team is on their guard […]

A Remote Work Contingency Plan Could Save Your Business

Off-site operations involve your business keeping itself operational even if it is forced to function without your office, be it fully remote through your employees? home offices or through a temporary office setup. There are two categories that should be addressed for your off-site plan to work: technology requirements and space requirements. Let?s consider them both. Technology Requirements One of the biggest challenges of any off-site operations plan is technology and making sure that all resources are accessible to those who need them. If a disaster ever destroys your infrastructure, you?ll also want to have data backup and disaster recovery implemented. Most backup solutions let you restore data directly to the device itself, meaning that there is minimal downtime in the event of a disaster and the recovery process can start immediately. However, you also need to take measures to ensure your team also has access to these resources, such as the hardware requirements (like laptops, smartphones, etc.) and the software solutions that utilize them (through the cloud, for example). Other solutions to consider include communications applications and productivity software. Space Requirements Modern technology has given businesses so many options to complete work, along with the tools that allow for it. Off-site locations can, again, include your employees? home offices, like if they were working remotely, or a temporary office setup similar to a satellite location. In either case, you will have to make sure that your employees have access to it so they can work during these difficult times. While a satellite office or temporary office does have its merits, remote work is cheaper and more cost-effective, and there are many benefits to reap from this as well, like the low comparative cost to set up; all you need to do is make sure your team has access to the tools and technology needed to get their work done. If your business needs help with planning for remote operations, White Mountain IT Services can help. To learn more, reach out to us at (603) 889-0800.

Tip of the Week: Working Remotely, Without Overworking Remotely

First Off: Yes, Overwork is an Issue There are a lot of workplace challenges that remote work has brought to light beyond overwork, many of which are too deep and divisive to really broach into here?including wage inequality and racial imbalances in the workplace, for instance. However, while these issues can be too much of a challenge for us to properly address in this format, the one that overwork presents is different. Overwork can have significant impacts on the welfare of a business? employees in many different ways. Employees can feel fatigued, anxious, and experience a variety of other physical symptoms like headache, pain, and vision problems. In addition to this, it can wreak havoc upon interpersonal relationships? and all of this is for nothing because overworking can actually diminish a person?s productivity due to their increased fatigue and depressed performance. This all exacerbated when the pandemic forced more businesses than ever into remote work practices, with a far larger number of people suffering from the emotional stress and pressure that remote work can lead to. So? what can be done about overworking, even when the work is being done remotely? How to Help Diminish Remote Overwork While you obviously can?t go to each remote worker?s house and check in on them, there are a few policies that can help decrease overworking in general?helping to reduce the phenomenon in-house and remotely at the same time. 1. Support the Use of a Schedule ?and not just a schedule dictating work hours, either. Establishing a workday routine that starts when one gets up and ends when one goes to bed (not just one that lays out the time spent actively working) can help immensely, as it generates a habit of starting and ending work at consistent (and appropriate) times. This consistent schedule will help reinforce the limits you want the workday to have. 2. Use Time Tracking Tools Time tracking is another great way to help keep your team from overworking, as they?ll have a reference to where they are in the day in terms of their tasks. Plus, with a visual reminder of what they have on their plate already, your team members will be that much more cognizant of their limits. White Mountain IT Services can help you acquire these tools, so don?t hesitate to reach out. 3. Encourage Your Team to Speak Up Finally, you need to empower your team to let you know when their work requirements are starting to overcome them. If they are feeling overburdened and afraid to say no to additional tasks, they?ll be more likely to take on more and more and dig themselves a deeper hole. Make sure they know that they can approach you about these concerns before they get to that point. From the tools that your team uses to work, to those that help you manage when your team does its work, White Mountain IT Services is here to help you put them to use. Give us a call at (603) 889-0800 to learn more.

How is Your Business at Managing Risk?

The International Organization for Standardization, also known as ISO, outlines the steps required for an effective risk management strategy. You may notice that they are relatively straightforward, but this should not dissuade you from taking a close look at each of them. The process itself of outlining your risk management strategy will likely be a long one. Identify Risks The first step is to identify notable risks for your organization. This could include anything that threatens the future of your business, be it natural disasters, hardware failures, compliance challenges, cyberattacks, staff turnover, financial collapse, etc. Analyze the Likelihood and Impact of Each One Out of all potential threats, which are the ones you are most likely to experience? You must determine how likely each of them is to happen and analyze the impact that they might have on your business? future. Prioritize Risk Management Based on Business Objectives Depending on your company?s objectives, you will have to assign a priority for how you will address risk management. For example, if you live in an area where natural disasters are commonplace, this would be high up on the priority list. Another example would be data privacy compliance, especially if you are in an industry where this is expected and heavily reinforced. Treat or Respond to Risk Conditions Depending on the risk, there will be methods you can implement to handle them, almost all of which will be preventative in nature. The reason for this is simple: if you can prevent the risk from impacting operations, you effectively eliminate it. This is not always possible, but you should aim for preventative measures instead of reactive ones whenever possible. Monitor Results and Adjust as Needed Naturally, you can perform all the research into potential risks you want, but if you are not monitoring the results of your efforts, you won?t know if they are working or not. And if they are not, you need to take steps to adjust what you have in place so they align with your organizational goals. White Mountain IT Services can help your business implement a risk management strategy for its IT resources and systems. With our expertise, you can remain confident that you are prepared to handle the majority of issues your organization could face down the road. To learn more, reach out to us at (603) 889-0800.

What Do You Need Onsite Computing For?

Why the Cloud is So Valuable If your business is like many others, you probably have made the jump to cloud-based resources for some of your business? computing needs. You?ve probably done so because the massive costs of renewing your on-premise infrastructure doesn?t make a whole lot of sense since there are options that remove them from the equation altogether. Computing in the cloud is valuable because all of the costs associated with running enterprise-level applications are effectively whittled down into a per-month or per-GB offering. The value in streamlining your business? computing is palpable.  If you consider that today you can get about any type of computing resource in the cloud, it makes it pretty easy to set your business up any way you want. This means that you can embrace strategies to reduce cost, while still having the computing resources your business needs to thrive. Moreover, cloud-based tools give an organization the flexibility that other platforms simply don?t. We covered the cost, but it?s easier to scale solutions to your business? demands, and since you only need a working Internet connection to access these tools, people can work from anywhere at any time with little or no problems.  There are some drawbacks to cloud computing, however.  When It Makes Sense to Stay In-House Onsite computing is the traditional way businesses have been doing it for decades. Essentially you get servers where you host your applications and data and they function as a central hub to your business? operational ability. For businesses that have been around a while, having onsite computing isn?t so rare. This isn?t just because of the opportunity, it is because most businesses have systems they need uninterrupted access to, and even though cloud computing resources feature more uptime than ever before, any downtime for these systems can be problematic.  Additionally, security is a consideration. With onsite computing, your organization can control access, network traffic, and more, much more completely than if you utilize public cloud platforms. It stands to reason that systems that need to be maintained for compliance reasons or simply to protect your organization?s most delicate information should be hosted onsite. That?s not to say that you can?t get secure computing platforms in the cloud, it?s just that you don?t have assurance that you control the strategies and tools used to maintain data security.  Regardless of what type of computing infrastructure you choose to use, the IT professionals at White Mountain IT Services can set your business up with the tools and support you need to keep your operations running efficiently and effectively. Give us a call today at (603) 889-0800 to learn more.